Research Analyst - Security, Risk Management, and Compliance

Enterprise Management Associates

March 2022 - Present

• Cyber Security, Risk Management, and Compliance

Client Solutions Development/Senior Systems Engineer

Federal Contractor

October 2015 – February 2022 (6 years 6 months) Shepherdstown, WV

• Cyber Security Specialist for Federal agency

Senior Security Engineer

Federal Contractor

September 2014 – September 2015 (1 year 1 month) Frederick, MD

• Cyber Security Specialist for Federal agency

Cyber Security Operations Engineer (Senior Consultant)

Federal Contractor

March 2012 – September 2014 (2 years 7 months) Falling Waters, WV

• Cyber Security Specialist for Federal agency

Cyber Security Senior Consultant

Federal Contractor

June 2011 – March 2012 (10 months) Martinsburg, WV

• Cyber Security Specialist for Federal agency

Information Assurance Engineer

Federal Contractor

August 2006 – June 2011 (4 years 11 months) Frederick, MD

Information Assurance Engineer, Frederick, MD

• Information Assurance for Federal defense agency


Bachelor's of Science - Computer Science

Mount Saint Mary's University

Class of 2006


CompTIA Security+

CompTIA Advanced Security Practitioner (CASP)


Death by Identity Theft

  • My very first book - including types of identity theft, impact of identity theft, reducing risk, and what to do if it happens to you

All of my books are available for purchase on this web page.

Social Engineering - You Are a Target

  • One hour long training webinar to help employees identify phishing attempts

The Need for a Cyber Attack Warning System

  • Guest blog post and RFUN 2013 Conference presentation for Recorded Future

Tricks of the Trade – How Malware Authors Cover Their Tracks

  • As security applications evolve to detect more advanced malware, the authors of said malware must adapt and develop new tricks to avoid detection

Voices in the Static – Proactive Cyber Threat Monitoring

  • Proactive threat monitoring is by no means an end-all solution - and security best practices should continue to be followed by your organization. However, adding proactive threat monitoring to your cyber security toolbox, much like checking the weather report, will help your organization prepare for any upcoming “cyber storms”.